Analysis

  • max time kernel
    93s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 14:32

General

  • Target

    ڷVIPҸ/77169.org˵.htm

  • Size

    4KB

  • MD5

    98ee6e8383a3693b9aed0024c6c56295

  • SHA1

    ed862d3c419ea991d642c5b302df213e2cef03ce

  • SHA256

    516efd1450fb09e7afa5465a5e2b1c874aab81b0864e3ee1ac4a225d6a69a81b

  • SHA512

    5ceee4b944526aa67ba8a6fe1d9ed9cef118a69e526947b77215c47f7614302a5c7ccde13b75e6bf13eb2eba7e8fa6ef3f233aeb39819c19de1d095ffac85257

  • SSDEEP

    96:mQOQeRA2RWhwM6w6mheySgh/SnljQhhwQZy0X8LJhLoOlExbRls7zlaQLIak:7X8A0VdIYehu2hwQZx+JhLoOlExNl0zI

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ڷVIPҸ\77169.org˵.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4512
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4512 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:5092

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    520071a63bb5e2038486cd0ce14055b1

    SHA1

    752cfb61bbe3ae1e2c2609c53aeee510661a59ed

    SHA256

    f8a989e9cf1fe0f0000c795537122a3c727e3b570b66582bfb62d9bbae4b20f8

    SHA512

    6f0131c9e0943c6a13d52a7525e1c592c95db868bf2dd21a8a37254150a239748985cc31518d0c4844bebfc5613feee6857b5debfbbbd6ed4539cd5e494ebbb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    3baa2088ff795a6e188b6f9d6452aeb6

    SHA1

    02971e8443279a002590319236f6833d8201a877

    SHA256

    5fc9136bcca98ec0cdc00763c94751ff831c87b4f1b03f1387acebc8c25dbe39

    SHA512

    5d6726d6d711548e40b016ac6171deb7d7cbc3604ab305fd32f12071fd3966e45f0f7575aa837b924c05ad6cba68490592a24d7feb3b262067beefdf9ffb9a9a

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z2evvp3\imagestore.dat

    Filesize

    1KB

    MD5

    ecb0e316ea88190db6ce9140563be508

    SHA1

    fed0ae7a67afd4c17c125eb2b5a414ba18e585b3

    SHA256

    6c6158bde2e28612b7256351416c0f585e7e090356a5cd3cf3bbddc145b9cca6

    SHA512

    58f848a456fcf86fe0ce980abcc92a6ebd27c428c3644458204e0ba89ca6259f264df00e3915b6e4af968d9ad25e005987deab8ce018bc09fca4c79dde5ab20d